Quantcast
Channel: BulletProof Security Forum » All Posts
Viewing all articles
Browse latest Browse all 12461

Reply To: Protect Login Page from Brute Force Login Attacks

$
0
0

[Topic has been merged into this relevant Topic]

It seems that my site was the subject of a brute force attack(?) on my admin panel login page.  I looked at my BPS Log Files and there was an attempt every single minute for 2 days; however the last one was 3 hours ago.  Here is what BPS has in the log – each one is identical except for the timestamp: So does this mean BPS is blocking the attack?  Or do I need to do something else – like maybe put that IP address on a block or deny list?

[400 GET Bad Request: April 30, 2015 - 4:47 pm]
Event Code: The request could not be understood by the server due to malformed syntax.
Solution: N/A - Malformed Request - Not an Attack
REMOTE_ADDR: 134.249.48.79
Host Name: 134-249-48-79-broadband.kyivstar.net
SERVER_PROTOCOL: HTTP/1.1
HTTP_CLIENT_IP:
HTTP_FORWARDED:
HTTP_X_FORWARDED_FOR:
HTTP_X_CLUSTER_CLIENT_IP:
REQUEST_METHOD: GET
HTTP_REFERER:
REQUEST_URI: http://bruceleibowitz.net/wp-login.php
QUERY_STRING:
HTTP_USER_AGENT:
  • This reply was modified 9 hours ago by  AITpro Admin.
  • This reply was modified 8 hours, 58 minutes ago by  AITpro Admin.
  • This reply was modified 8 hours, 57 minutes ago by  AITpro Admin.

Viewing all articles
Browse latest Browse all 12461

Trending Articles